Prof. Nathan L Clarke BEng(Hons) PhD CEng FBCS SMIEEE SFHEA
Professor of Cyber Security & Digital Forensics
Brief biographical information
nathan.clarke@plymouth.ac.ukProf Clarke is a Professor of Cyber Security and Digital Forensics at Plymouth University. Prof Clarke is also an adjunct Professor at Edith Cowan University, Western Australia. His research interests reside in the area of information security, biometrics, forensics and intrusion detection and has over 200 outputs consisting of journal papers, conference papers, books, edited books, book chapters and patents. He is the Chair of the IFIP TC11.12 Working Group on the Human Aspects of Information Security & Assurance. Prof Clarke is a chartered engineer, a fellow of the British Computing Society (BCS) and a senior member of the IEEE and the author of Transparent Authentication: Biometrics, RFID and Behavioural Profiling published by Springer and Computer Forensics: A Pocket Guide published by IT Governance.
Research interests
Information Systems Security
Intrusion Detection Systems
Biometric Authentication
Digital Forensics
Security Management and Risk Assessment
Security Education and Awareness
Education/qualifications
PGCert Learning & Teaching in Higher Education
PhD, "Advanced User Authentication for Mobile Devices"
BEng (Hons) Electronic Engineering (1st Class)
IEEE Certified Biometrics Professional
AccessData Certified Examiner (ACE)
AccessData Mobile Phone Examiner (AME)
Professional memberships
Senior Fellow of the Higher Education Academy (SFHEA)
Fellow of the British Computing Society (FBCS), 2010
Senior Member of the Institute for Electrical and Electronic Engineers (IEEE), 2011
Chartered Engineer (CEng), July 2006
Chair, IFIP TC11 Working Group 11.12 Human Aspects of Information Security & Assurance (www.ifipsec.org)
Member, IFIP TC11 Working Group 11.1 on Information Security Management
Member, IFIP TC11 Working Group 11.6 on Identity Management
BCS South West: Branch Committee Member: Membership Secretary, 2005-2017
BCS South West: Branch Committee Member: Young Professional Representative, 2001-2004
External appointments
External Examiner for BEng (Hons) Computer Security and Forensics, BEng (Hons) Computer Systems and Networks & BSc (Hons) Cyber Security, Edinburgh Napier University (2017-2021)
Project Reviewer, University of Sharjah, UAE
External Examiner for MSc in Cyber Security and Forensics, University of Westminster (2015 – 2019)
External Advisor for Programme Approval of MComp Computer Forensics, Computer Security, Computer Networks, Liverpool John Moores University, December 2015
Consultant to UK Foreign Commonwealth Office - Cyber Security Initiative - Gap Analysis of the Government of Trinidad & Tobago (2013)
External Examiner for MSc in Cybersecurity and Management, University of Warwick (2012 - 2017)
Programme Approval of Mcomp/BSc (Hons) Computer Security with Forensics, Sheffield Hallam University (April 2011)
Programme Approval of BSc (Hons) Computer Forensics, Liverpool John Moores University (Beckett College) (March 2011)Programme Approval of BSc (Hons) Computer Forensics, Liverpool John Moores University (Beckett College) (March 2011)Adjunct Associate Professor, Edith Cowan University, Western Australia (2010)
Programme Approval of MSc Computer Systems and MSc Computer Applications, University of Bedfordshire (June 2010)
Programme Approval of MSc Web Technologies, MSc Media Technology Management and MSc Sound Engineering, Birmingham City University (May 2010)
External Examiner for MSc Computer Applications in Accounting and MSc Computer Systems Auditing, London Metropolitan University (2009 - Present)
Adjunct Lecturer, Edith Cowan University, Western Australia (2008)
Programme Approval of BSc (Hons) Mobile Communications Technology, University of Central England (March 2007)
External Examiner for MSc Computer Forensics & Security, University of Bedfordshire, UK (2007-Present)
Programme Approval of BSc (Hons) Computing & Information Security, Sheffield Halam University (March 2008)
External Research Council Reviewing:
Engineering and Physical Sciences Research Council (EPSRC), UK
National Research Foundation (NRF), South Africa
National Research Council Canada (NRC), Canada
Portuguese Foundation for Science and Technology (FCT)
Technology Foundation STW, The Netherlands
Flanders Innovation and Entrepreneurship, Belgium
The Royal Society, United Kingdom
European Research Council
The Royal Society, UK
Grants and other income
- Knowledge Transfer Partnership. Essential 6 Ltd. 2015: £124,000
- Security Consultancy. Kernow Health Solutions. 2014: £5000
- EPSRC. Identifying and Responding to Human and Software Behaviours in a Changing Cyber Threat Landscape. 2013: £173,383 (Total Award: £1.0M)
- Teaching Fellowship Award – e-Invigilator. Plymouth University. 2012: £8100
- EU Framework 7 Grant. Centre of Excellence in Cybercrime and Forensics: 2012: £7800 (Total Award: £800k)
- EU Framework 7 Grant. Geryon. 2011: €478K (Total Award: €2.5M)
- Knowledge Transfer Partnership. Absolute Software Limited. 2010: £183,094
- EU Framework 7 Grant. Space Data Routers. 2010: £220,000 (Total Award: €1.6M)
- Knowledge Transfer Partnership. K2 Medical Systems. 2008: £115,804.
- Teaching Fellowship Award – Peer Assessment. University of Plymouth. 2008: £4900
- Knowledge Transfer Partnership. Spinnaker International. 2008: £141,599
- Knowledge Transfer Partnership. Westland GeoProjects Limited. 2008: £109,633
- DTI Funded project into Behavioural Monitoring of Network Communications. 2007: £40,000
- End Point Compliance. Symantec.2007: £7,000
- Flexible and non-intrusive user authentication for mobile devices. EduServ Foundation. 2006: £80,390
- Knowledge Transfer Partnership. Parker Hannifin 2005: £174,000
- Subscriber Authentication via Keystroke Analysis on a mobile handset. Orange Personal Communication Services Limited. 2004. £19,814
- Biometric Terminal, Phase 1. Orange Personal Communication Services Limited. 2003: £55,000
- PC Integrity Testing. Plymouth Trading Standards. 2003-2004: £1,250
- WinCPR Software Development. SAHFOS. 2002: £4,000
Journal papers
A novel privacy preserving user identification approach for network traffic | |
Identifying Users by Network Traffic Metadata | |
A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches | |
An Automated Approach for Digital Forensic Analysis of Heterogeneous Big Data | |
Leveraging Biometrics for Insider Misuse Identification | |
Adaptive Behavioral Profiling for Identity Verification in Cloud Computing: A Model and Preliminary Analysis | |
A suspect-oriented intelligent and automated computer forensic analysis | |
Awareness of Mobile Device Security: A Survey of User's Attitudes | |
A Novel Taxonomy for Mobile Applications Data | |
Active Authentication: The Panacea of Access Control | |
A Fine-Grained Analysis of User Activity on Mobile Applications: The Sensitivity Level Perception | |
A forensic acquisition and analysis system for IaaS | |
Continuous and transparent multimodal authentication: reviewing the state of the art | |
Continuous user authentication using multi-modal biometrics | |
Language-independent gender identification through keystroke analysis | |
Android Forensic Data Analyzer (AFDA): An Opensource Tool to Automatize Event Correlation Analysis on Android Devices | |
The Price of Patching | |
End-to-middle-to-end solution for IMS media plane security | |
Active authentication for mobile devices utilising behaviour profiling | |
Co-operative user identity verification using an Authentication Aura | |
A response selection model for intrusion response systems: Response Strategy Model (RSM) | |
Sun Behind Clouds - On Automatic Cloud Security Audits and a Cloud Audit Policy Language | |
Incident prioritisation using analytic hierarchy process (AHP): Risk Index Model (RIM) | |
Power to the people? The evolving recognition of human aspects of security | |
An agent based business aware incident detection system for cloud environments | |
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers | |
Misuse Detection for Mobile Devices Using Behaviour Profiling | |
Authentication Aura - A distributed approach to user authentication | |
Establishing A Personalized Information Security Culture | |
Comparing Intentions to Use University-Provided vs. Vendor-Provided Multibiometric Authentication in Online Exams | |
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm | |
A Friend Mechanism for Mobile Ad Hoc Networks | |
From desktop to mobile: Examining the security experience | |
Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks | |
Beyond the PIN: Enhancing user authentication for mobile devices | |
The application of signature recognition to transparent handwriting verification for mobile devices | |
Advanced user authentication for mobile devices | |
A Composite User Authentication Architecture for Mobile Devices | |
Authenticating Mobile Phone Users Using Keystroke Analysis | |
The role of academic qualifications in the IT security profession | |
Authentication of users on mobile telephones - A survey of attitudes and practices | |
Biometrics - The promise versus the practice | |
Biometrics: No silver bullets | |
Keystroke Dynamics on a Mobile Handset: A Feasibility Study | |
Acceptance of subscriber authentication methods for mobile telephony |
45 Journal papers
Conference papers
Continuous identity verification in cloud storage services using behavioural profiling | |
The Cyber Security Degree Apprenticeship: An Academic Route to Embedding Professional Skills | |
Transparent Authentication: Utilising Heart Rate for User Authentication | |
Body Temperature Authentication for Secure Smartwatch to Smart Device Communication | |
Insider Misuse Attribution using Biometrics | |
Enabling Secure Cloud Storage through Transparent Authentication | |
Unobtrusive Gait Recognition Using Smartwatches | |
Information Security Behavior: Recognizing The Influencers | |
A Forensic Acquisition Based upon A Cluster Analysis of Non-Volatile Memory in IaaS | |
Insider Misuse Identification using Transparent Biometrics | |
Software Defined Privacy | |
Providing Security in Container-Based HPC Runtime Environments | |
Information Security Policies: A Review of Challenges and Influencing Factors | |
User profiling from network traffic via novel application-level interactions | |
Activity Recognition using wearable computing | |
A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment | |
Increasing eLearning Engagement Using Mobile Technologies | |
The Value of the Biometrics in Invigilated E-Assessments | |
Proactive Biometric-Enabled Forensic Imprinting | |
A Scalable Architecture for Distributed OSGi in the Cloud | |
Information Security and Practice: The User's Perspective | |
Towards privacy for ambient assisted living in a hybrid cloud environment | |
Transparent Authentication Systems for Mobile Device Security: A Review | |
Towards Dynamic Adaption of User's Organisational Information Security Behaviour | |
Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes | |
Active Authentication: The Panacea of Access Control? | |
A Survey of Continuous and Transparent Multibiometric Authentication Systems | |
Forensic Investigation of Network Traffic: A Study into the Derivation of Application-Level features from Network-Level Metadata | |
The Current Use of Authentication Technologies: An Investigative Review | |
Cloud Forensics: A Review of Challenges, Solutions and Open Problems | |
Behavioral-Based Feature Abstraction from Network Traffic | |
E-Invigilation of E-Assessments | |
Text-Based Active Authentication for Mobile Devices | |
A Forensically-Enabled IAAS Cloud Computing Architecture | |
A User-oriented Network Forensic Analyser: The Design of a High-Level Protocol Analyser | |
Android Forensics: Correlation Analysis | |
Performance Evaluation of A Technology Independent Security Gateway for Next Generation Networks | |
Performance-driven evaluation for deploying IMS-based interoperability scenarios | |
An Evaluation of Behavioural Profiling on Mobile Devices | |
Data Carving using Artificial Headers | |
Cloud Forensics Challenges | |
Anomaly Detection In IaaS Clouds | |
Towards an Automated Forensic Examiner (AFE) Based upon Criminal Profiling & Artificial Intelligence | |
A Conceptual Model for Federated Authentication in the Cloud | |
Learning management systems in higher education: a faculty perspective | |
User Requirements for Future Wideband Critical Communications | |
A Technology Independent Security Gateway for Future Emergency Telecommunication Systems (ETS) | |
Challenges to Digital Forensics: A Survey of Researchers & Practitioners Attitudes and Opinions | |
Towards Continuous and Convenient User Authentication | |
E-Invigilator: A Biometric-Based Supervision System for e-Assessments | |
A Technology Independent Security Gateway for Real-Time Multimedia Communication | |
Multimodal Biometric Surveillance using a Kinect Sensor | |
Learning management systems in higher education: a student perspective | |
Web-Based Risk Analysis for Home Users | |
Validating Cloud Infrastructure Changes by Cloud Audits | |
A Response Strategy Model for Intrusion Response Systems | |
A Feasibility Study into Tracking Wi-Fi Enabled Mobile Devices | |
A Novel Security Architecture for a Space-Data DTN | |
Multi-Modal Behavioural Biometric Authentication for Mobile Devices | |
Information Leakage Through Second Hand Usb Flash Drives within the United Kingdom | |
Incident detection for cloud environments | |
An autonomous agent based incident detection system for cloud environments | |
A Risk Index Model for Security Incident Prioritisation | |
A preliminary investigation of distributed and cooperative user authentication | |
SMS Linguistic Profiling Authentication on Mobile Devices | |
Personal Knowledge Management - Beyond Versioning | |
Risk Assessment for Mobile Devices | |
Behaviour Profiling for Transparent Authentication for Mobile Devices | |
Towards a Flexible, Multi-Level Security Framework for Mobile Devices | |
Culture of Integration: Literacy Tools for the Masses | |
Behavioural Biometric Authentication For Mobile Devices | |
Behaviour Profiling on Mobile Devices | |
Assessing the Usability of End-User Security Software | |
A distributed and cooperative user authentication framework | |
An investigation and survey of response options for Intrusion Response Systems (IRSs) | |
Service Quality Assessment in Distance Learning | |
E-Book readers in academic personal knowledge management | |
An Analysis of Information Security Awareness within Home and Work Environments | |
Strong Authentication for Web Services using Smartcards | |
A Critical Evaluation of an Online Peer Assessment System (OPAS) | |
Assessing the Usability of Personal Internet Security Tools | |
Flexible and Transparent User Authentication for Mobile Devices | |
Creation of logic-linguistic structure defining the educational services of Atlantis University | |
How recommender systems applied in personal knowledge management environments can improve learning processes | |
Intrusion Detection System for Mobile Devices: Investigation on Calling Activity | |
Deployment of Keystroke Analysis on a Smartphone | |
Effective Information Assurance for SMEs | |
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset | |
Investigating the problem of IDS false alarms: An experimental study using Snort | |
Assessing the challenges of Intrusion Detection Systems | |
Transparent Facial Recognition for Mobile Devices | |
Device- versus Network-Centric Authentication Paradigms for Mobile Devices: Operational and Perceptual Trade-Offs | |
Building a Trusted Community for Mobile Ad Hoc Networks Using Friend Recommendation | |
Utilising Biometrics for Transparent Authentication on Mobile Devices | |
User Perception of the Security & Privacy Concerns of RFID Technology | |
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices | |
Perceptions of User Authentication on Mobile Devices | |
Web-Based Risk Analysis and Education for Home Users | |
The Awarenesss and Perception of Spyware Amongst Home PC Computer Users | |
Transparent Handwriting Verification for Mobile Devices | |
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks – A Friend Approach | |
Attack Pattern Analysis: Trends in Malware Variant Development | |
Considering the role of academic qualifications for IT security professionals | |
User Authentication for Mobile Devices: A Composite Approach | |
Artificial Impostor Profiling for Keystroke Dynamics on a Mobile Handset | |
Organisational Security Culture: Embedding Security Awareness, Education and Training | |
User Authentication by Service Utilisation Profiling | |
Application of Keystroke Analysis to Mobile Text Messaging | |
Using Keystroke Analysis as a mechanism for Subscriber Authentication on Mobile Handsets | |
Biometric Authentication for Mobile Devices | |
Subscriber Authentication for Mobile Phones through the Implementation of | |
Advanced Subscriber Authentication Approaches For Third Generation Mobile |
112 Conference papers
Books
![]() | Transparent User Authentication |
![]() | Computer Forensics: A Pocket Guide |
2 Books
Edited books
![]() | Proceedings of the Eleventh International Symposium on Human Aspects of Information Security & Assurance (HAISA 2017) |
![]() | Proceedings of the Tenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2016) |
![]() | Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015) |
![]() | Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014) |
![]() | Proceedings of the European Information Security Multi-Conference (EISMC 2013) |
![]() | Proceedings of the Sixth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2012) |
![]() | Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis (WDFIA 2012) |
![]() | Proceedings of the Fifth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2011) |
![]() | Proceedings of the Sixth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2011) |
![]() | Proceedings of the South African Information Security Multi-Conference (SAISMC 2010) |
![]() | Proceedings of the Fourth International Workshop on Digital Forensics & Incident Analysis (WDFIA 2009) |
![]() | Proceedings of the Third International Symposium on Human Aspects of Information Security & Assurance (HAISA 2009) |
![]() | Proceedings of the Second International Symposium on Human Aspects of Information Security & Assurance (HAISA 2008) |
![]() | Proceedings of the International Symposium on Human Aspects of Information Security & Assurance (HAISA 2007) |
14 Edited books
Contributions to edited books
![]() | Delay-tolerant networks (DTNs) for deep-space communications |
![]() | Understanding Cloud Audits |
![]() | User Authentication Technologies |
3 Contributions to edited books
Patents filed
Method of Associating a Person with a Digital Object | |
Adjusting an operating mode of a security container in response to an unexpected received radio signal | |
A container and security systems |
3 Patents filed
Posters
3D Facial Recognition and Eye Tracking | |
User Behaviour with Organisational Information Security Policies | |
A Framework of User Identification From Network Traffic | |
A Review of Cloud Forensics issues, solutions & open problems | |
E-invigilation of E-Assessments | |
Non-Intrusive Biometric Authentication for Mobile Devices | |
Non-Intrusive Subscriber Authentication for 3G Mopbile System |
7 Posters
Internal publications
Web-Based Risk Analysis for Home Users | |
Web-based Risk Analysis for SMEs | |
A Crime Depended Automated Search and Engine for Digital Forensics | |
Developing a Mobile WiFi Tracking Unit | |
Improving Online Collaboration within the IFIP Working Group on Human Aspects of Information Security and Assurance | |
Study of RSA Performance in Java Cards | |
Security on Mobile Devices: A Survey of Users’ Attitudes and Opinions | |
Culture of Integration: Literacy Tools for the Masses | |
Web-based Risk Analysis Tool for Home Users | |
Information Leakage through Second Hand USB Flash Drives | |
Usability of Security Mechanism | |
Design and Development of Hard Disk Images for use in Computer Forensics | |
Comparative Study and Evaluation of Six Face Recognition Algorithms with a View of their Application on Mobile Phones | |
School Children! A Security Aware Generation? | |
Smartphone Deployment of Keystroke Analysis | |
Information Security Leakage: A Forensic Analysis of USB Storage Disks | |
Implementing Biometrics to Curb Examination Malpractices In Nigeria | |
Information Security Awareness and Culture | |
Customer Satisfaction Monitoring System in Higher Education | |
Response Mechanisms for Intrusion Response Systems (IRSs) | |
Novel Single Sign On Architecture Based on the Subscriber Identity Module for Web Services | |
A Generic Information Security Framework for Mobile Systems | |
Analysis and Evaluation of IDS Alerts on a Corporate Network | |
Public Opinion Towards RFID Technology | |
Mobile Devices- Personal or Corporate: Providing a Mechanism for Security | |
Mobile Devices Personal or Corporate providing a Mechanism for Security | |
Quantitative Analysis of Educational Services for Innovative Marketing in Higher Education | |
Intrusion Detection System for Mobile Devices: Preliminary Investigation | |
Keystroke analysis as an authentication method for thumb-based keyboards on mobile handsets | |
Intrusion Detection System for mobile devices | |
Web-Based Risk Analysis and Education for Home Users | |
The Awareness and Perception of Spyware amongst Home PC Computer Users | |
Device versus network-centric authentication models for mobile devices – operational and perceptual trade-offs | |
Mobile Devices - Future Security Threats & Vulnerabilities | |
Biometrics for Mobile Devices: A Comparison of Performance and Pattern Classification Approaches | |
Security policies for small and medium enterprises | |
User Authentication by Service Utilisation Profiling | |
Reliability of Commercial Biometric Authentication Solutions | |
Artificial Impostor Profiling for Keystroke Analysis on a Mobile Handset |
39 Internal publications
225 publication(s) - all categories.
Editorships / Refereeing for journals
Journal Editorships:
Editorial Board Member, Computers & Security, Elsevier
Editorial Board Member, International Journal of Cyber Warfare and Terrorism, IGI Global
Editorial Board Member, KSII Transactions on Internet and Information Systems
Guest Editor:
Information & Computer Security, Vol. 24, No. 2, 2016
Information Management & Computer Security, Vol. 21, No. 1, 2013
International Journal of Digital Crime and Forensics, Vol. 4, No. 4, 2012
International Journal of Digital Crime and Forensics, Vol. 3, No. 3, 2011
Information Management & Computer Security, Vol. 20, No. 1, 2012
Information Management & Computer Security, Vol. 18, No. 1, 2010
Information Management & Computer Security, Vol. 18, No. 5, 2010
Information Management & Computer Security, Vol. 17, No. 1, 2009
Information Management & Computer Security, Vol. 15, No. 5, 2007
Referring for Journals:
Computer Standards and Interfaces, Elsevier
Computers & Security, Elsevier
EURASIP Journal on Advances in Signal Processing, Springer
IEEE Communications Surveys and Tutorials
IEEE Journal on Selected Areas in Communications Special Issue on Advances in Digital Forensics for Communications and Networking
IEEE Transactions on Cybernetics, IEEE
IEEE Transactions on Human-Machine Systems, IEEE
IEEE Transactions on Information Forensics & Security, IEEE
IET Information Security, IET
IET Signal Processing, IET
Information Security Journal: A Global Perspective Information Security Technical Report, Elsevier
International Journal of Computer Science and Security, Computer Science Journals
International Journal of Electronic Governance (IJEG), Inderscience
International Journal of Information Technologies and Systems Approach, IGI Global
International Journal of Interdisciplinary Telecommunications & Networking, IGI Global
International Journal of Pattern Recognition and Artificial Intelligence, World Scientific
Internet Research, Emerald
Journal for Information Warfare Information Sciences, Elsevier
Journal of Internet Services and Applications, Springer
Journal of Mobile Networks &Applications, Springer
Journal of Network and Computer Applications, Elsevier
Journal of Systems and Software, Elsevier
Journal on Personal and Ubiquitous Computing:Special Issue: Security and Trust in Context-Aware Systems, Springer
KSII Transactions on Internet and Information Systems
Recent Patents in Computer Science, Bentham Science
Security & Communication Networks, JohnWiley & Sons
The Computer Journal, Oxford Journals
Conferences organised
In Progress:
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2017), Adelaide, Australia
Completed:
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2015), Lesvos, Greece
Co-Chair: Human Aspects of Information Security & Assurance (HAISA, 2014), Plymouth, UK
Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFAIA, 2014), Plymouth, UK
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2013), Lisbon, Portugal
Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2013), Lisbon, Portugal
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2012), Crete, Greece
Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2012), Crete, Greece
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2011), Kingston University, United Kingdom
Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2011), Kingston University, United Kingdom
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2010), Nelson Mandela Metropolitan University, South Africa
Programme Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2010), Nelson Mandela Metropolitan University, South Africa
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2009), Univerity of Piraeus, Athens, Greece
Programme Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2009), Univerity of Piraeus, Athens, Greece
Track Chair: Mobility & Security, 8th Security Conference, April 2009, Las Vegas, USA
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2008), University of Plymouth, UK
Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2007), University of Plymouth, UK
Track Chair: Mobility & Security, 6th Security Conference, April 2007, Las Vegas, USA
Other international conference activities
1. International Programme Committee, Information Security for South Africa (ISSA), Johannesburg, South Africa, 12-14 August 2015
2. International Programme Committee, 5th International Conference on IT Convergence and Security, Kuala Lumpur, Malaysia, 24-27 August 2015
3. International Programme Committee Member, 6th International Conference on e-Discovery, Athens, Greece, 10-11 December 2015
4. International Programme Committee Member, 2nd Emerging Aspects in Information Security, Lodz, Poland, 13-16 September 2015
5. International Programme Committee Member, International Conference on Availability, Reliability and Security (AReS), France, 24-28 August 2015
6. International Programme Committee, The 10th International Conference on Systems and Network Communications (ICSNC 2015), Barcelona, Spain, 15-20 November 2015

7. International Programme Committee, Workshop on Information Security Education (WISE), Hamburg, Germany, Morocco, 26-28 May 2015
8. International Programme Committee, 30th IFIP TC-11 SEC 2015 International Information Security & Privacy Conference, Hamburg, Germany, Morocco, 26-28 May 2015
9. International Programme Committee, IEEE International Conference of the Biometrics Specialist Interest Group (BIOSIG), Darmstadt, Germany, 9-11 September 2015.
10. International Conference Committee Member, 10th International Conference on Cyber Warfare and Security (ICCWS), Kruger National Park, South Africa, 24-25 March 2015
11. International Programme Committee, HCI International – Human Aspects of Security, Privacy and Trust, Los Angeles, USA, 2-7 August 2015
12. International Programme Committee, IEEE International Conference of the Biometrics Specialist Interest Group (BIOSIG), Darmstadt, Germany, 10-12 September 2014.
13. International Programme Committee, Fist African Citizenship Conference (ACCC 2014), Port Elizabeth, South Africa, 5-6 November 2014
14. International Programme Committee, ISSA, South Africa, 13-15 August 2014
15. International Programme Committee, 29th IFIP TC-11 SEC 2014 International Information Security & Privacy Conference, Marrakech, Morocco, 2-4 June 2014
16. International Programme Committee Member, 9th International Conference on Availability, Reliability and Security (AReS), Switzerland, 8-11 September 2014
17. International Programme Committee, The 9th International Conference on Systems and Network Communications (ICSNC 2014), Nice, France, 12-16 October 2014

18. International Programme Committee Member, 11th International Conference on Trust, Privacy and Security in Digital Business (TrustBus '14), Munich, Germany, 1-5 September 2014
19. International Programme Committee, Advanced Cyberthreat Workshop, Oxford, UK, July 2014
20. International Programme Committee, 1st Symposium on Interdisciplinary Aspects of Security (IAS 14), Warsaw, Poland, 7-10 September 2014
21. Associate Editor, 22nd European Conference on Information Systems: Information Security Track, Tel Aviv, Israel, 9-11 June 2014
22. International Conference Committee Member, 9th International Conference on Cyber Warfare and Security (ICCWS), Indiana, US, 24-25 March 2014
23. International Programme Committee, The Second International Workshop on Cyber Patterns: Unifying Design Patterns with Security, Attack and Forensic Patterns, Oxfordshire, UK, 9-10 July 2013
24. International Programme Committee, World Conference on Information Security Education and Management (WISE8), Auckland, New Zealand, 8-10 July 2013
25. International Programme Committee, International Conference of the Biometrics Specialist Interest Group (BIOSIG), Darmstadt, Germany, 5-6 October 2013.
26. International Programme Committee, ISSA, Johannesburg, South Africa, 14-16 August 2013
27. International Programme Committee, 28th IFIP TC-11 SEC 2013 International Information Security & Privacy Conference, Auckland, New Zealand, 8-10 July 2013
28. Programme Committee, The 11th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, Zhangjiajie, China, 13-15 November 2013
29. Programme Committee Member, Fifth International Conference on Internet Technologies and Applications, Wrexham, UK, 10-13 September 2013.
30. International Programme Committee Member, 10th International Conference on Trust, Privacy and Security in Digital Business (TrustBus '13), Prague, Czech Republic, 26-30 August 2013
31. International Programme Committee Member, 8th International Conference on Availability, Reliability and Security (AReS), Germany, 2-6 September 2013

32. International Conference Committee Member, International Conference on Cloud Security Management (ICCSM-2013), Seattle, US, 17-18 October 2013
33. International Conference Committee Member, Workshop on Information Security and Privacy (WISP 2012), Florida, US, 15 December 2012
34. International Conference Committee Member, 8th International Conference on i-Warfare and Security (ICIW), Colorado, USA, 25-26 March 2013

35. International Programme Committee, The First International Workshop on Cyber Patterns: Unifying Design Patterns with Security, Attack and Forensic Patterns

36. International Programme Committee, SECAU Security Congress 2012, Perth, Australia, 3-5 December 2012.
37. Technical Programme Committee, The 7th International Conference on Frontier Of Computer Science and Technology - Trust, Security and Privacy, China, 21-23 November 2012 

38. International Programme Committee Member, 7th International Conference on Availability, Reliability and Security (AReS), Prague, 20-24 August 2012

39. International Programme Committee, Information Security South Africa (ISSA), Johannesburg, South Africa, 15-17 August 2012

40. International Programme Committee, The 7th International Conference on Systems and Network Communications (ICSNC 2012), Lisbon, Portugal, 18-23 November 2012

41. International Conference Committee Member, IFIP Security Conference 2012, Heraklion, Greece, 4-6 June 2012 
International Conference Committee Member, 7th International Conference on i-Warfare and Security (ICIW), Seattle, USA, 22-23 March 2012

42. International Programme Committee Member, 8th International Conference on Trust, Privacy and Security in Digital Business (TrustBus '11), Toulouse, France, August 29 - September 2 2011

43. International Programme Committee, ISSA, South Africa, 15-17 August 2011
44. International Committee Member, IFIP Security Conference, Lucerne, Switzerland, 7-9 June 2011
45. International Conference Committee Member, The Sixth International Conference on Systems and Network Communications (ICSNC 2011), Barcelona, Spain, 23-28 October 2011
46. First Workshop on Information Security and Digital Investigations (ISAD 2010), Manchester, UK, 25-26 November 2010

47. International Conference Committee Member, 6th International Conference on i-Warfare and Security (ICIW), Washington, US, 17-18 March 2011

48. International Programme Committee Member, 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus '09), Bilboa, Spain, August 30 - September 3 2010

49. International Programme Committee, The Security Conference - Europe, Orebro, Sweden, 15-17 August 2010

50. International Programme Committee, ISSA, Johannesburg, South Africa, 2-4 August 2010
51. International Programme Committee Member, Fifth International Conference on Systems and Network Communications, Nice, France, 22-27 August 2010
52. International Programme Committee Member, 5th International Conference on Availability, Reliability and Security (AReS), Krakow, Poland, 15-18 February 2010.
53. International Programme Committee Member, International Symposium on Architecting Critical Systems (ISARCS 2010), Praque, Czech Republic, 23-25 June 2010.
54. International Conference Committee Member, 5th International Conference on i-Warfare and Security (ICIW), Nebraska, US, 8-10 April 2010
55. International Programme Committee, First International Workshop on Software Security Process, Vancouver, Canada, 29 August 2009.
56. International Programme Committee, South African Institute for Computer Scientists and Information Technologists, South Africa, 13-14 October 2009.
57. International Programme Committee Member, EUROMEDIA, Bruges, Netherlands, 15-17 April 2009
58. International Programme Committee Member, International Conference on Networks and System Communications (ICSNC 2009), Porto, Portugal, 20-25 September 2009
59. International Programme Committee Member, 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus '09), Linz, Austria, August 31 - September 4, 2009
60. International Programme Committee, 3rd Views on Designing Complex Architectures (VODCA), Bertinoro, Italy, 30-31 August 2008
61. International Programme Committee, South African Institute for Computer Scientists and Information Technologists, South Africa, 6-8 October 2008.
62. International Programme Committee, ISSA, Johannesburg, South Africa, 7-9 July 2008
63. Reviewer, IFIP Security Conference (IFIP SEC), Milan, Italy, 8-10 September 2008
64. Programme Committee, Workshop on Digital Forensics and Incident Analysis (WDFIA 2008), Malaga, Spain, October 2008
65. International Programme Committee Member, 5th International Conference on Trust, Privacy and Security in Digital Business (TrustBus '08), Turin, Italy, September 1-5, 2008
66. International Programme Committee Member, International Conference on Networks and System Communications (ICSNC 2008), Sliema, Malta, 26-31 October 2008
67. International Programme Committee Member, 3rd International Conference on Availability, Reliability and Security (AReS), 2008.
68. International Conference Committee Member, 3rd International Conference on i-Warfare and Security (ICIW), Nebraska, US, 24-25 April 2008.
69. International Programme Committee Member, International Conference on Networks and System Communications (ICSNC 2007), French Riviera, France, 25-31 August 2007
70. International Programme Committee, 8th Australian Information and Security Conference; 5th Australian Information Security Management Conference; 5th Australian Digtial Forensics Conference, Perth, Western Australia, Australia, 3-4 December 2007.
71. International Programme Committee, South African Institute for Computer Scientists and Information Technologists, South Africa, 9-11 October 2007.
72. International Programme Committee, International Conference on Communication, Network and Information Security (CNIS 2007), Berkeley, USA, August 24-26 2007
73. International Programme Committee, International Symposium on Information Security (IS '07), Iberian Peninsula, October 28 - November 2, 2007 74. Reviewer, 6th International Conference on Signal Processing, Robotics and Automation (ISPRA '07), Corfu, Greece, February 16-19, 2007
75. International Programme Committee, 4th International Conference on Trust and Privacy in Digital Business (TrustBus'07), Regensburg, Germany, September 3-7, 2007
76. International Programme Committee, EUROMEDIA 2007, Delft, Netherlands, April 2007 Reviewer, 7th Australian Information Warfare and Security Conference, Australia, December 2006
77. International Programme Committee Member, IFIP TC-11 WG11.1 & WG11.8 Joint Workshop on Information Security, IFIP Security Conference, South Africa, May 2007
78. Reviewer, Workshop on Spoofing, Digital Forensics and Open Source Tools, 2nd International Conference on Availability, Reliability and Security (AReS), Vienna, Austria, 10-13 April 2007
79. International Programme Committee Member, 2nd International Conference on Availability, Reliability and Security (AReS), Vienna, Austria, 10-13 April 2007 80. Programme Committee, 1st Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2006), Glamorgan, UK, 13 December 20
80. International Programme Committee Member, International Conference on Networks and System Communications (ICSNC 2006), Tahiti, French Polynesia, 2-4 November 2006
Current MPhil/PhD Supervisions
- Mr Leith Abed, Designing and implementing access control scheme in cloud computing
- Mrs Hiba Al-Kawaz, Forensic Facial Recognition of Multimedia Files
- Mr Neamah Al-Naffakh, Wearable Computing and Transparent Authentication
- Mrs Hind Al-Obaidi, Transparent Authentication Utilising Gait Recognition
- Ms Reem Alkanhel, Designing a usable security framework for IoT
- Mrs Manal Alohali, Information Security Risk Assessment for The General Public
- Mr Fayez Alotaibi, Human Aspects of Information Security
- Mr Saud Nejr Alotaibi, Taxonomy of Application-Based Behaviour Authentication for Mobile Security
- Mr Abdulrahman Alruban, Applying biometrics to digital forensics
- Mrs Samah Alshathri, Project Title TBC
- Mr Aziz Alshehri, Mobile Security
- Mr Abdulaziz Altamimi, Author Identification of of Text Limited Messages
- Mr Rami Alzahrani, Privacy Preserving Schemes for Mobile and Wearable Devices
- Mr Timibloudi Stephen Enamamu, Bioelectrical User Authentication
- Mr Stefan Frey, Autonomic SLA Management as a Service
- Mr Holger Gantikow, Secure High Performance Computing provided as PaaS
- Mr Dany Joy, An Intelligent Network Forensic Analyzer
- Mr Florian Kemmer, Privacy and Security Control of Smart Devices
- Mr Hendrik Kuijs, A PaaS framework for AAL services
- Mrs Shahlaa Mashhadani, Advanced Multimedia Analysis in Digital Forensics
- Mr Hussam Mohammed, Digital Forensic Analysis of Big Data
- Mr Thomas Rieger, Making and Success Factors for the Use of Big Data & Analytics Methods and Technologies
- Mr Faisal Shaman, User Traffic Profiling in Computer Networks
- Mr Emad Sherif, The Role of Culture in Influencing Employees’ Security Compliance
- Mr Georgios Vranopoulos, Metadata in Tackling Big Data Variety
Completed MPhil/PhD Supervisions
- Dr Abdulwahid Al Abdulwahid, Federated Authentication using the Cloud (Cloud Aura) (2017)
- Dr Mahmood Al Fahdi, Automated Digital Forensics & Cybercrime Profiling (2016)
- Dr Burhan Al-Bayati, Continuous Identity Verification in Cloud Computing Services (2018)
- Dr Mutlaq Alotaibi, User's behaviour with Organisational Information Security Policies (2017)
- Dr Gaseb Alotibi, Behavioural Monitoring via Network Communications (2017)
- Dr Saad Alqahtany, A Forensically-Enabled Cloud Computing Architecture (2017)
- Dr Vassilis Dimopoulos, Effective Information Assurance with Risk Management (2007)
- Dr Frank Doelitzscher, Security Audit Compliance for Cloud Computing (2014)
- Dr Chris Hocking, Authentication Aura: A cooperative and distributed approach to user authentication on mobile devices (2015)
- Dr Tarik Ibrahim, Improving Intrusion Prevention, Detection and Response (2011)
- Dr Nor Badrul Anuar Jumaat, Incident Prioritisation for Intrusion Response Systems (2012)
- Dr Sevasti Karatzouni, Non-Intrusive Continuous User Authentication for Mobile Devices (2014)
- Dr Salam Ketab, E-Invigilator of E-Assessment (2017)
- Dr Christopher Kosmas, Secure tracking system for next generation CIT products (2014)
- Dr Fudong Li, Behaviour Profiling for Mobile Devices (2012)
- Dr Shukor Razak, Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks (2007)
- Dr Thomas Rübsamen, Evidence-based Accountability Audits for Cloud Computing (2016)
- Dr Hataichanok Saevanee, Continuous User Authentication Using Multi-Modal Biometrics (2014)
- Dr Hanna Shauchenka, Marketing of virtual Universities (Atlantis University) – Application of Quantitative Analysis (2015)
- Dr Shuhaili Talib, Personalising Information Security Education (2014)
- Dr Witold Thaul, Supporting Learning by Tracing Personal Knowledge Formation (2014)
- Dr Gina C Tjhai, Anomaly-Based Correlation of IDS Alarms (2011)
- Dr Athanassios Triantafyllidis, Increasing eLearning Engagement through Mobile Learning Integration (2017)
Examination of research degrees
2017, Big Data Forensic as a Service, University of South Wales
2017, A Novel Human Visual Psychophysics Based Approach to Distinguish Between Human Users and Computer Robots, City University
2017, A Method to Enhance the Accuracy of Digital Forensics in the Absence of Complete Evidence in Saudi Arabia, De Montfort University
2017, A Malware Analysis and Detection System for Mobile Devices, University of Malaya
2016, A Generic Smartphone Forensic Investigation Process Model, University Putra Malaysia
2016, The Role of Security and its Antecedents in E-Government Adoption, Plymouth University (Internal)
2016, Defending Against Network and Application Level Denial of Service Attacks, Indian Institute of Technology, Patna, India
2016, Opportunities & Risks in Online Gaming Environments, Plymouth University (Internal)
2015, Techniques for Analysis & Detection of Android Malware, Malaviya National Institute of Technology, India.
2015, Asymmetric Encryption for Wiretap Channels, Plymouth University (Internal)
2015, PhD Thesis, Identifying Memory Address Disclosures, De Montfort University, UK
2015, PhD Thesis, Resolving Semantic Disparities in Digital Forensics, University of Pretoria, South Africa
2015, PhD Thesis, User Controlled Identity Management Systems using Mobile Devices, Glasgow University, UK
2015, PhD Thesis, Secure BPMN – A Graphical Extension for BPMN 2.0 Based pm a Reference Model of Information Assurance and Security, Cardiff University, UK
2015, PhD Thesis, Improved Composability of Software Components through Parallel Hardware Platforms for In-Car Multimedia Systems, University of Plymouth (Internal)
2015, PhD Thesis, A Near-Miss Analysis Model for Improving the Forensic Investigation of Software Failures, University of Pretoria, South Africa
2015, MTech Thesis, Guidelines to Address the Human Factor in the South African National Research and Education Network Beneficiary Institutions.
2015, PhD Thesis, Establishing an Information Security Awareness and Culture, Plymouth University (Internal)
2014, PhD Thesis, Context-Aware Attribute-Based Techniques for Data Security and Access Control in Mobile Cloud Environment, City University, UK
2014, DPhil Thesis, A Public Safety, Participatory Crowdsourcing Smart City Model for a Developing Country, University of Fort Hare, South Africa
2014, PhD Thesis, The Practical Implementation of Optimal and Pseudo-Optimal Routing Algorithms, Glyndwr University, United Kingdom
2014, PhD Thesis, Anonymous Authenticated Announcement Schemes in Vehicular Ad Hoc Networks, Royal Holloway, University of London
2014, PhD Thesis, Method for the Adoption of Information Technology Governance, Risk Management and Compliance in Swiss Hospitals, Plymouth University (Internal)
2013, MSc Thesis, Forensic Evidence Isolation in Clouds, University of Pretoria, South Africa
2013, PhD Thesis, Digital Forensics: An Integrated Approach for the Investigation of Cyber/Computer Related Crimes, University of Bedfordshire
2013 Service Quality and Profit Control in Utility Computing Service Life Cycles, PhD Thesis, Plymouth University (Internal Examiner)
2012 The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice, PhD Thesis, Murdoch University, Australia
2012 Security Usability in IT Systems, MPhil Thesis, Plymouth University (Internal Examiner)
2011 Pre-emptive Mobile Code Protection using Spy Agents, PhD Thesis, Royal Holloway, University of London
2011 Enhancing User Authentication Using Graphical Techniques, PhD Thesis, University of Plymouth (Internal Examiner), UK2011 An Inside Misuse Threat Specification Language, PhD Thesis, University of Plymouth (Internal Examiner), UK2011 Behavioural Profiling in Mobile Neworks, PhD Thesis, University of Plymouth (Internal Examiner), UK2010 An Investigation into Remote Transactions, PhD Thesis, Edith Cowan University, Australia
2010 Intrusion Detection Method using a Combination of Neural Network Algorithms, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
2010 Parameter Based Identification, Authentication and Authorisation Method for Mobile Devices, PhD Thesis, City University, London, UK
2010 An Automatic Bank System for Client Credit Rating, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
2009 Smartcard Architecture for Dynamic and Secure Authentication, MSc, University of Pretoria, South Africa
2008 Models and Methods of Information Security Risks Assessment in the Cirumstances of Input Information Ambiguity, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
2008 Adoption of Criminal Profiling to Combat Hacking, MPhil Thesis, University of Plymouth, UK - Internal Examiner
2007 Establishing Information Security Culture in Australian Small and Medium Enterprises, PhD Thesis, Deakin University, Australia
2007 A Key Management Framework for Secure Group Communication in Wireless Mobile Environments, PhD Thesis, Royal Holloway, University of London, UK
2006 The Effectiveness of Graphical Authentication: An Exploratory Study, PhD Thesis, Deakin University, Australia
2006 Ontology Modeling for the Information Sharing Process within the Labour Market, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
2006 Corporate Information Risk: An Information Security Governance Framework, MTech Dissertation, Nelson Mandela Metropolitan University, South Africa
Invited Presentations, Lectures, etc.
Invited Panel, “Privacy, Encryption and Hacktivism: Is your Information Safe Online?”, Chatham House – The Royal Institute of International Affairs, London, UK, September 2017
Invited Lecturer, “Introduction to Digital Forensics”, IPICS Summer School, Corfu, Greece, June 2017
Invited Panel, “Insider Misuse”, The Security Conference, Las Vegas, April 2017
Invited Presentation, “Usable Authentication”, City University, March 2017
Invited Panel, “Cybercrime, Can we Keep Up?”, Plymouth University, February 2017
Invited Lecturer, “Introduction to Cloud Security & Forensics”, IPICS Summer School, Ghent, Belgium, July 2016
Invited Lecturer, “Introduction to Cloud Security & Forensics”, IPICS Summer School, Lesvos, Greece, July 2015
Invited Presentation, “Transparent & Continuous Authentication”, De Montfort University, 11th March 2015
Invited Presentations, “Digital Forensic Challenges & Research”, ESIEA – Sciences et Technologies du Numerique, Paris, 23rd February 2015
Invited Presentation, “Continuous Authentication”, Princess Nora University, Saudi Arabia, 27th November 2014
Invited Presentation, “Active Authentication: The Natural Evolution”, Biometrics 2014, London, 21st October 2014
Invited Scholar, IPICS Summer School, Lesvos, Greece, Juiy 2014
Invited Scholar, University of Fort Hare, South Africa, April 2014
Invited Presentation, "The Role of Digital Forensics within Organisations", Secure South West, Plymouth, December 2013
Invited Presentation, "Information Security: Impacts and Consequences", Brunel University, London, November 2010
Invited Presentation, "Security and Privacy", Brunel University, London, November 2009
Invited Presentation, "The Future of Biometrics in E-Learning Systems ", Biometric Consortium Conference, Florida, USA, September 2009
Invited Presentation, "Effective User Authentication for Mobile Devices", University of Nevada, London, July 2009
Invited Presentation, "Applications Security", University of Tunis-Carthage, Tunis, Tunisia, March, 2009
Invited Presentation, "Biometrics - No Silver Bullet", University of Portsmouth, Portsmouth, UK, January 2009
Invited Lecturer, IPICS Summer School, Regensburg, Germany, July 2008
Invited Presentation, "Flexible and Transparent User Authentication for Mobile Devices", Oviedo, Spain, May 2008
Invited Presentation, "User Authentication for Mobile Devices", University of Portsmouth, Portsmouth, UK, March 2007
Invited Presentation, "Biometric Authentication for Mobile Devices", Aston University, Birmingham, UK, Feburary 2007
Keynote Speech, The Art of Computing Technology 2006, "Biometrics: The Future of Personal Authentication", University of Technology Malaysia, March 2006
Invited Lecturer/Scholar, University of Technology Malaysia, March/April 2006
Keynote Speech, 11th Conference on Human Computer Interaction, "Biometrics: The Promise Versus the Practice", Oviedo, Spain, 22-24 March 2006
Invited Lecturer/Scholar, Nelson Mandela Metropolitan University, August/September 2005
Invited Lecturer, IPICS Summer School, Chios, Greece, July 2005
Invited Lecturer, IPICS Winter School, Oulu, Finland, April 2005
Winner of the Best Paper Award at the International Conference on Cyber Incident Response, Coordination, Containment & Control (Cyber Incident 2016)
Awarded 'Best Student Paper Award" at 6th International Conference on Cloud Computing and Services Science (CLOSER 2016
Awarded 'Best Student Paper Award" at the 7th Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2016)
Second Place, The 2012 IEEE Services Cup, Hawaii, USA, 2012
Best Paper Award, 3rd International Conference on Emerging Network Intelligence (EMERGING 2011), Lisbon, Portugal, 2011
Best Paper Award, 9th Information Security Management Conference, Perth, Australia, 2011
Best Student Paper, 10th European Conference on Information Warfare and Security (ECIW), Tallin, Estonia, 2011
Outstanding Paper Award, Information Management & Computer Security, Emerald, Paper: "The Application of Signature Recognition to Transparent Handwriting Verification for Mobile Devices", 2008
Best Paper Prize, 3rd Australian Information Warfare and Security Conference, Perth, Australia, 2002.
Best Poster Prize, 5th World Conference & Exhibition on the Practical Application of Biometrics, London, UK, 2002